In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information ...Download Now
Multiple-Input Multiple-Output (MIMO) technology has great potential for improving the throughput of Wireless Mesh Networks (WMNs). In this paper, the authors investigate the joint stream allocation and scheduling problem for single-user MIMO communication in WMNs with the objective of maximizing the demand satisfaction for a set of flows. The notion ...Download Now
Currently, spam and scams are passive attack over the inbox which can initiated to steal some confidential information, to spread Worms, Viruses, Trojans, cookies and Sometimes they are used for phishing attacks. Spam mails are the major issue over mail boxes as well as over the internet. Spam mails can ...Download Now
In the last few years, Mobile Ad-hoc NETworks (MANET) have gained increasing attention from both the researchers and the actual users. As MANET nodes are generally battery-powered devices, the challenging task is how to reduce the energy consumption of nodes and hence conserve energy of the whole system, which extend ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?